Acronyms
3D | three-dimensional |
3GPP | 3rd Generation Partnership Project |
ABAC | Access-Based Access Control |
ACD | Applied Cybersecurity Division |
ACM | Association of Computing Machinery |
ACMD | Applied and Computational Mathematics Division |
AI | artificial intelligence |
ANTD | Advanced Network Technologies Division |
BGP | Border Gateway Protocol |
BGPSec | Secure Border Gateway Protocol |
CMVP | Crypto Module Validation Program |
CSD | Computer Security Division |
CTL | Communications Technology Laboratory |
CVE | Common Vulnerabilities and Exposures |
CVSS | Common Vulnerability Scoring System |
DOE | Department of Energy |
FFRDC | federally funded research and development center |
FIPS | Federal Information Processing Standards |
FTE | full-time equivalent |
GPSS | General Purpose Simulation System |
HSM | Hardware Security Model |
IAD | Information Access Division |
ICN | information-centric networking |
IEEE | Institute of Electrical and Electronics Engineers |
IETF | Internet Engineering Task Force |
IFIP | International Federation of Information Processing |
INCITE | Innovative and Novel Computational Impact on Theory and Experiment |
IoT | Internet of Things |
IoTDI | Internet of Things Design and Implementation |
ISO | International Organization for Standardization |
ISP | Internet service provider |
ITL | Information Technology Laboratory |
NCCoE | National Cybersecurity Center of Excellence |
NICE | National Initiative for Cybersecurity Education |
NIST | National Institute of Standards and Technology |
NLN | network localization and navigation |
NRC | National Research Council |
NSF | National Science Foundation |
NSTIC | National Strategy for Trusted Identities in Cyberspace |
NVD | National Vulnerability Database |
OPM | Office of Personnel Management |
PCI-DSS | Payment Card Industry Data Security Standard |
PIV | Personal Identification Verification |
PKI | Public Key Infrastructure |
PREP | Professional Research Experience Program |
QRC | Quantum-Resistant Cryptography |
R&D | research and development |
RBAC | Role-Based Access Control |
RF | radio frequency |
RMF | Risk Management Framework |
SED | Statistical Engineering Division |
SIS | Susceptible-Infected-Susceptible |
SLA | Service Level Agreement |
SNAP | Stanford Network Analysis Platform |
SP | Special Publication |
SSD | Software and Systems Division |
TCP | transmission control protocol |